Preferred Language
Articles
/
OhcAXJIBVTCNdQwCOa3c
Minimizing the Principle Stresses of Powerhoused Rock-Fill Dams Using Control Turbine Running Units: Application of Finite Element Method
...Show More Authors

This study focuses on improving the safety of embankment dams by considering the effects of vibration due to powerhouse operation on the dam body. The study contains two main parts. In the first part, ANSYS-CFX is used to create the three-dimensional (3D) Finite Volume (FV) model of one vertical Francis turbine unit. The 3D model is run by considering various reservoir conditions and the dimensions of units. The Re-Normalization Group (RNG) k-ε turbulence model is employed, and the physical properties of water and the flow characteristics are defined in the turbine model. In the second phases, a 3D finite element (FE) numerical model for a rock-fill dam is created by using ANSYS®, considering the dam connection with its powerhouse represented by four vertical Francis turbines, foundation, and the upstream reservoir. Changing the upstream water table minimum and maximum water levels, standers earth gravity, fluid-solid interface, hydrostatic pressure, and the soil properties are considered. The dam model runs to cover all possibilities for turbines operating in accordance with the reservoir discharge ranges. In order to minimize stresses in the dam body and increase dam safety, this study optimizes the turbine operating system by integrating turbine and dam models.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The use of multi choice Goal Programming to reduce storage and shortage costs of blood units in health care centers
...Show More Authors

We use of multi-choice Goal Programming (MCGP), which is a developed model of Goal Programming where it is used in circumstances of the multiplicity and difference of goals when choosing between decision alternatives in cases of allocating resources, as it is a model that seeks to find the closest and best solutions to the specific values ​​of the goals within the aspiration levels, as the first goal in the multi-choice goal programming model that is used to reduce the total cost of storage and shortage, while the other goal was to reduce the difference between the real demand that the hospitals need from the blood transfusion center and the units that already achieved. The case Iraqi Center

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
1st Samarra International Conference For Pure And Applied Sciences (sicps2021): Sicps2021
Analysis the average lattice strain in the crystal direction (hkl) in MgO nanoparticles by using modified Williamson-Hall method
...Show More Authors

In this work ,the modified williamos-Hall method was used to analysis the x-ray diffraction lines for powder of magnesium oxide nanoparticles (Mgo) .and for diffraction lines (111),(200),(220),(311) and (222).where by used special programs such as origin pro Lab and Get Data Graph ,to calculate the Full width at half maximum (FWHM) and integral breadth (B) to calculate the area under the curve for each of the lines of diffraction .After that , by using modified Williamson –Hall equations to determin the values of crystallite size (D),lattice strain (ε),stress( σ ) and energy (U) , where was the results are , D=17.639 nm ,ε =0.002205 , σ=0.517 and U=0.000678 respectively. And then using the scherrer method can by calculated the crystal

... Show More
View Publication
Scopus (8)
Crossref (8)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Design of PV Solar Energy Generator using MPPT Technique to Control Single Input/Multiple Outputs (DC-DC) Converter
...Show More Authors

The paper presents the design of a system consisting of a solar panel with Single Input/Multiple Outputs (DC-DC) Buck Converter by using Simulink dialogue box tools in MATLAB software package for simulation the system. Maximum Power Point Tracking (MPPT) technique depending on Perturb and Observe (P&O) algorithm is used to control the output power of the converter and increase the efficiency of the system. The characteristics of the MSX-60 PV module is chosen in design of the system, whereas the electrical characteristics (P-V, I-V and P-I curves) for the module are achieved, that is affected by the solar radiation and temperature variations. The proposed design module has been found to be stable for any change in atmospheric tempera

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Feb 12 2022
Journal Name
Engineering, Technology & Applied Science Research
Investigating the Causes of Poor Cost Control in Iraqi Construction Projects
...Show More Authors

Controlling cost in construction projects is an essential issue. This study investigates the most critical problems that cause weakness in cost control in Iraqi construction projects. The quantitative technique was used by conducting a survey directed to professionals who work on construction projects. One hundred and sixty-four questionnaire forms were distributed to private sector companies, government companies, and government institutions, and the responses were subjected to the required statistical analysis. The results indicate that the most influential factors are the weakness in keeping up with the use of modern concepts, methods, and technologies, the delay in receiving the amounts due for work done from the owner, fluctuat

... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (25)
Crossref (12)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Computers, Materials & Continua
A New Hybrid Feature Selection Method Using T-test and Fitness Function
...Show More Authors

View Publication
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Using Graph Mining Method in Analyzing Turkish Loanwords Derived from Arabic Language
...Show More Authors

Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Feb 05 2021
Journal Name
Research In Intelligent And Computing In Engineering
Implementing Web Testing System Depending on Performance Testing Using Load Testing Method.
...Show More Authors

Web testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t

... Show More
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref